Login / Signup
On Best-Possible Obfuscation.
Shafi Goldwasser
Guy N. Rothblum
Published in:
J. Cryptol. (2014)
Keyphrases
</>
reverse engineering
control flow
static analysis
malware detection
data transformation
preprocessing
artificial intelligence
social networks
decision trees
reinforcement learning
distributed systems
data mining techniques